Commit Graph

2799 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
96594b6723 Merge pull request #80566 from BenTheElder/fix-image-ref
fix kube-proxy manifest
2019-07-25 22:36:36 -07:00
Kubernetes Prow Robot
bf2dd03083 Merge pull request #80318 from davidxia/fix-err-caps
cleanup: fix some log and error capitalizations
2019-07-25 10:41:28 -07:00
Benjamin Elder
1cf8a06d12 add reciprocal note about keeping manifests in sync 2019-07-25 00:44:11 -07:00
Kubernetes Prow Robot
0612c7de0b Merge pull request #80232 from shihan9/gce
remove function apply-encryption-config in configure-helper
2019-07-24 13:50:19 -07:00
Taahir Ahmed
9702c6e6e9 GCP config: gke-exec-auth-plugin for ValidatingAdmissionWebhook
This commit adds support for using `gke-exec-auth-plugin` (vTPM-based
certificates for mTLS) for webhooks when calling endpoints matching
`*.googleapis.com`, and integrates this support with
ValidatingAdmissionWebhook.

To enable it, request ValidatingAdmissionWebhook with
`ADMISSION_CONTROL=...,ValidatingAdmissionWebhook,...` (default) and
opt in to `gke-exec-auth-plugin` using `WEBHOOK_GKE_EXEC_AUTH=true`
during the configuration process.

If you don't opt-in, ValidatingAdmissionWebhook will be deployed as
before.

Requesting `WEBHOOK_GKE_EXEC_AUTH=true` will fail if you have not
provided other configuration variables:

  * `EXEC_AUTH_PLUGIN_URL`: controls whether `gke-exec-auth-plugin` is
    downloaded during the installation step.  A prerequisite for
    actually using the plugin.

  * `TOKEN_URL`, `TOKEN_BODY`, and `TOKEN_BODY_UNQUOTED`:
    configuration values used when calling the plugin.  `TOKEN_URL`
    and `TOKEN_BODY` have existing usage. `TOKEN_BODY_UNQUOTED` is a
    new variable that is meant to sidestep the problem of inverting
    `strconv.Quote` in Bash.

The existing configuration process for ImagePolicyWebhook has been
reworked to make it play nicely with ValidatingAdmissionWebhook under
`WEBHOOK_GKE_EXEC_AUTH=true`.

  * It originally placed the ImagePolicyWebhook configuration object
    at the top-level of the file specified by
    `--admission-control-config-file`.  I can't see why this worked;
    it must have been hitting some sort of lucky path through the
    various config file loading mechanisms.  Now, it places its
    configuration in a sub-field of that file, which is shared among
    all admission control plugins.

  * It mounted its various config files read-write.  I reviewed the
    code and couldn't see why it was necessary, so I moved the config
    files into the existing read-only mount at `/etc/srv/kubernetes`.

  * It now checks that all the configuration values it requires have
    been provided.

Co-authored-by: Mike Danese <mikedanese@google.com>
Co-authored-by: Taahir Ahmed <taahm@google.com>
2019-07-22 16:01:37 -07:00
David Xia
fabfd950b1 cleanup: fix some log and error capitalizations
Part of https://github.com/kubernetes/kubernetes/issues/15863
2019-07-20 18:26:16 -04:00
Kubernetes Prow Robot
49f6510d9a Merge pull request #80277 from draveness/feature/revert-cleanup-critical-pod
Revert "feat: cleanup pod critical pod annotations feature"
2019-07-18 19:31:37 -07:00
Javier Pérez Hernández
288ea10a59 gce: configure: use 'amd64' in kube core images manifest 2019-07-18 08:31:45 -07:00
draveness
d83526d253 Revert "feat: cleanup pod critical pod annotations feature"
This reverts commit b6d41ee5cc.
2019-07-18 13:31:12 +08:00
Shihang Zhang
e6607cc259 remove function apply-encryption-config in configure-helper
Change-Id: I4df76abcc94eb222219968dc5e08655677d4623f
2019-07-16 14:03:13 -07:00
Davanum Srinivas
6b06084df6 Drop -r for variable within loop
using `local -r` will blow up, example output:
```
/home/kubernetes/bin/configure.sh: line 388: local: manifest_name: readonly variable
```

Change-Id: Id379180803d44dd9c7ac0da41c1cd56de0fe54a4
2019-07-14 11:05:29 -04:00
Kubernetes Prow Robot
b9615d5bbc Merge pull request #80054 from javier-b-perez/load-image
cluster: configure: load images and add tags with no arch
2019-07-13 15:37:03 -07:00
Javier Pérez Hernández
438ff151d4 cluster: configure: load images and add tags with no arch 2019-07-12 16:40:40 -07:00
Kubernetes Prow Robot
5be1efe9bd Merge pull request #79447 from almos98/start-stackdriver-workaround
Wait for StackdriverLogging service to stop before restarting it.
2019-07-12 14:11:06 -07:00
Alexion Ramos
6edbb95f53 Wait for StackdriverLogging service to stop before restarting it. 2019-07-11 17:54:38 -07:00
draveness
b6d41ee5cc feat: cleanup pod critical pod annotations feature 2019-07-11 08:54:19 +08:00
Kubernetes Prow Robot
4cabe6217f Merge pull request #79626 from wenjiaswe/remove-etcd-ca-key
Remove unnecessary ETCD_CA_KEY check
2019-07-08 14:28:14 -07:00
Kubernetes Prow Robot
097681b619 Merge pull request #72206 from tallclair/audit-profile-test
Audit profile test
2019-07-05 19:00:35 -07:00
Tim Allclair
d06f849379 Audit policy test 2019-07-03 10:39:37 -07:00
Kubernetes Prow Robot
f9a7ca8bab Merge pull request #79703 from mborsz/master_node_labels
Add MASTER_NODE_LABELS
2019-07-03 05:58:31 -07:00
Maciej Borsz
08f8d2ef46 Fix HA setup logic 2019-07-03 11:17:31 +02:00
Maciej Borsz
20d5bb4afe Add MASTER_NODE_LABELS 2019-07-03 09:39:14 +02:00
Kubernetes Prow Robot
5ee329c799 Merge pull request #77271 from krzysied/gce_instance_parallel
Creating instance groups in parallel
2019-07-02 05:45:08 -07:00
Wenjia Zhang
22591ad8f2 Remove unnecessary ETCD_CA_KEY check 2019-07-01 15:19:16 -07:00
Kubernetes Prow Robot
ed1f9748b1 Merge pull request #78727 from mborsz/script
Modify kube-up to support cluster without nodes.
2019-07-01 09:43:21 -07:00
Kubernetes Prow Robot
3f221551b6 Merge pull request #78728 from mborsz/firewall
Modify firewall rules names to make them shorter.
2019-07-01 07:23:34 -07:00
Maciej Borsz
5f10c284c8 Modify kube-up to support cluster without nodes. 2019-07-01 15:29:45 +02:00
Wei Huang
6f10758446 followup of 79262 to cleanup PodPriority leftover 2019-06-28 14:19:26 -07:00
Kubernetes Prow Robot
ed9f340add Merge pull request #79305 from paivagustavo/clean-up-self-set-node-labels
Clean up self-set node labels
2019-06-27 11:37:21 -07:00
Koonwah Chen
46ff8e6b57 Add env var(CNI_STORAGE_PATH) for cni storage path. 2019-06-24 11:47:14 -07:00
Kubernetes Prow Robot
eee3e976d8 Merge pull request #78294 from vllry/kp-remove-resource-container
Remove deprecated flag --resource-container from kube-proxy
2019-06-22 00:38:12 -07:00
Kubernetes Prow Robot
fb1e9c0473 Merge pull request #79007 from wangzhen127/fix-npd-config
Clean up node-problem-detector configuration for GCI
2019-06-21 12:16:27 -07:00
Gustavo Paiva
ca3519c7ad Clean up selft-set node labels 2019-06-20 00:07:31 -03:00
Vallery Lancey
dc0f14312e Removed deprecated --resource-container flag from kube-proxy. 2019-06-16 08:36:42 -07:00
Kubernetes Prow Robot
71a7be41e0 Merge pull request #78705 from yujuhong/gce-win-owners
Add more approvers/reviewers to cluster/gce/windows
2019-06-14 13:27:14 -07:00
Zhen Wang
8f40368fb6 Clean up node-problem-detector configuration for GCI 2019-06-13 21:43:05 -07:00
Łukasz Osipiuk
94c80b1afc Update Cluster Autoscaler version to 1.15.0 2019-06-10 20:08:59 +02:00
Łukasz Osipiuk
df304b0a4d Update Cluster Autoscaler version to 1.15.0-beta.1 2019-06-07 17:11:03 +02:00
Maciej Borsz
31f18c0a6d Modify firewall rules names to make them shorter. 2019-06-05 13:18:53 +02:00
Kubernetes Prow Robot
3cd41a5a0b Merge pull request #78668 from mtaufen/disable-kubeletpodresources
Disable KubeletPodResources on Windows
2019-06-04 14:34:03 -07:00
Yu-Ju Hong
b300267a57 Add more approvers/reviewers to cluster/gce/windows 2019-06-04 11:42:55 -07:00
Michael Taufen
a66cb353d4 Disable KubeletPodResources on Windows
The feature caused tests to fail when it was enabled.

- https://github.com/kubernetes/kubernetes/issues/78628

Work is in progress to fix the feature, but until that work is complete,
we will disable it in the GCE scripts.
2019-06-03 15:39:55 -07:00
Yu-Ju Hong
4a7be385a1 Update README for GCE/Windows
Add instructions to create e2e clusters without building binaries
locally. Also update the instructions to build the binaries locally.
2019-06-03 11:17:50 -07:00
Kubernetes Prow Robot
b82d7cabf4 Merge pull request #78552 from mtaufen/use-auth-header
Windows startup scripts should use Authorization header for GCS requests
2019-06-01 12:12:41 -07:00
Kubernetes Prow Robot
21c9c7a6ab Merge pull request #78507 from pjh/gce-firewall-enabled
GCE Windows nodes: leave firewall enabled.
2019-06-01 06:22:17 -07:00
Michael Taufen
e2116ef572 Windows startup scripts should use Authorization header for GCS requests
Requests against private buckets will fail unless the VM has storage
scope and the default service account token is provided in the request
header.

This PR replicates the following Linux changes for Windows:
- https://github.com/kubernetes/kubernetes/pull/74142
- https://github.com/kubernetes/kubernetes/pull/75269
2019-05-30 16:55:55 -07:00
Kubernetes Prow Robot
6d70e7ff01 Merge pull request #77930 from mm4tt/upload_kubeconfig
Upload kubeconfig to master metadata in tests.
2019-05-30 06:30:24 -07:00
Kubernetes Prow Robot
88da568586 Merge pull request #78406 from losipiuk/lo/split-args-ca
Split CA paramters on manifest template expansions
2019-05-30 00:32:46 -07:00
Peter Hornyack
d47dd75df8 GCE Windows nodes: leave firewall enabled. 2019-05-29 18:08:52 -07:00
Kubernetes Prow Robot
5c314535d1 Merge pull request #78183 from cheftako/masterTaint
Ensure kubernetes master is properly tainted in GCE.
2019-05-29 17:24:46 -07:00